MPC-Friendly Commitments for Publicly Verifiable Covert Security
- URL: http://arxiv.org/abs/2109.07461v1
- Date: Wed, 15 Sep 2021 17:52:18 GMT
- Title: MPC-Friendly Commitments for Publicly Verifiable Covert Security
- Authors: Nitin Agrawal, James Bell, Adri\`a Gasc\'on, Matt J. Kusner
- Abstract summary: We address the problem of efficiently verifying a commitment in a two-party computation.
Our constructions operate in the publicly verifiable covert (PVC) security model.
We show that our constructions are tight in terms of required non-linear operations.
- Score: 16.430876603766965
- License: http://arxiv.org/licenses/nonexclusive-distrib/1.0/
- Abstract: We address the problem of efficiently verifying a commitment in a two-party
computation. This addresses the scenario where a party P1 commits to a value
$x$ to be used in a subsequent secure computation with another party P2 that
wants to receive assurance that P1 did not cheat, i.e. that $x$ was indeed the
value inputted into the secure computation. Our constructions operate in the
publicly verifiable covert (PVC) security model, which is a relaxation of the
malicious model of MPC appropriate in settings where P1 faces a reputational
harm if caught cheating.
We introduce the notion of PVC commitment scheme and indexed hash functions
to build commitments schemes tailored to the PVC framework, and propose
constructions for both arithmetic and Boolean circuits that result in very
efficient circuits. From a practical standpoint, our constructions for Boolean
circuits are $60\times$ faster to evaluate securely, and use $36\times$ less
communication than baseline methods based on hashing. Moreover, we show that
our constructions are tight in terms of required non-linear operations, by
proving lower bounds on the nonlinear gate count of commitment verification
circuits. Finally, we present a technique to amplify the security properties
our constructions that allows to efficiently recover malicious guarantees with
statistical security.
Related papers
- Privacy-Preserving Inference for Quantized BERT Models [13.36359444231145]
Quantization offers a promising solution by converting floating-point operations into lower-precision integer computations.<n>We propose a fine-grained, layer-wise quantization scheme and support 1-bit weight fully connected layers in a secure setting.
arXiv Detail & Related papers (2025-08-03T07:52:08Z) - Safe Low Bandwidth SPV: A Formal Treatment of Simplified Payment Verification Protocols and Security Bounds [0.0]
We show that SPV is not only secure under bounded adversarial assumptions but strictly optimal for digital cash systems requiring scalable and verifiable transaction inclusion.<n>This document serves both as a blueprint for secure SPV implementation and a rebuttal of common misconceptions surrounding non-validating clients.
arXiv Detail & Related papers (2025-07-01T13:44:48Z) - Robust and Verifiable MPC with Applications to Linear Machine Learning Inference [1.3612043566819643]
We present an efficient multi-party computation protocol that provides strong security guarantees in settings with dishonest majority of participants.<n>With complete identifiability, honest parties can detect and unanimously agree on the identity of any malicious party.<n>We benchmark our protocol on a ML-as-a-service scenario, wherein clients off-load the desired computation to the servers, and verify the computation result.
arXiv Detail & Related papers (2025-05-31T11:26:57Z) - BiCert: A Bilinear Mixed Integer Programming Formulation for Precise Certified Bounds Against Data Poisoning Attacks [62.897993591443594]
Data poisoning attacks pose one of the biggest threats to modern AI systems.
Data poisoning attacks pose one of the biggest threats to modern AI systems.
Data poisoning attacks pose one of the biggest threats to modern AI systems.
arXiv Detail & Related papers (2024-12-13T14:56:39Z) - RISecure-PUF: Multipurpose PUF-Driven Security Extensions with Lookaside Buffer in RISC-V [12.294919757082608]
RISecure-PUF is a security extension utilizing existing Physical Unclonable Functions.
A one-way hash function is integrated to ensure provable security against modeling attacks.
RISecure-PUF improves at least $2.72times$ in batch scenarios with negligible hardware overhead.
arXiv Detail & Related papers (2024-11-21T11:26:23Z) - Provably Robust Conformal Prediction with Improved Efficiency [29.70455766394585]
Conformal prediction is a powerful tool to generate uncertainty sets with guaranteed coverage.
adversarial examples are able to manipulate conformal methods to construct prediction sets with invalid coverage rates.
We propose two novel methods, Post-Training Transformation (PTT) and Robust Conformal Training (RCT), to effectively reduce prediction set size with little overhead.
arXiv Detail & Related papers (2024-04-30T15:49:01Z) - SOCI^+: An Enhanced Toolkit for Secure OutsourcedComputation on Integers [50.608828039206365]
We propose SOCI+ which significantly improves the performance of SOCI.
SOCI+ employs a novel (2, 2)-threshold Paillier cryptosystem with fast encryption and decryption as its cryptographic primitive.
Compared with SOCI, our experimental evaluation shows that SOCI+ is up to 5.4 times more efficient in computation and 40% less in communication overhead.
arXiv Detail & Related papers (2023-09-27T05:19:32Z) - East: Efficient and Accurate Secure Transformer Framework for Inference [7.887332345182056]
We propose a framework emphEast to enable efficient and accurate secure Transformer inference.
Compared to Iron, we achieve about 1.8$times$ lower communication within 1.2$times$ lower runtime.
arXiv Detail & Related papers (2023-08-19T06:26:14Z) - Online Safety Property Collection and Refinement for Safe Deep
Reinforcement Learning in Mapless Navigation [79.89605349842569]
We introduce the Collection and Refinement of Online Properties (CROP) framework to design properties at training time.
CROP employs a cost signal to identify unsafe interactions and use them to shape safety properties.
We evaluate our approach in several robotic mapless navigation tasks and demonstrate that the violation metric computed with CROP allows higher returns and lower violations over previous Safe DRL approaches.
arXiv Detail & Related papers (2023-02-13T21:19:36Z) - Efficient Policy Iteration for Robust Markov Decision Processes via
Regularization [49.05403412954533]
Robust decision processes (MDPs) provide a framework to model decision problems where the system dynamics are changing or only partially known.
Recent work established the equivalence between texttts rectangular $L_p$ robust MDPs and regularized MDPs, and derived a regularized policy iteration scheme that enjoys the same level of efficiency as standard MDPs.
In this work, we focus on the policy improvement step and derive concrete forms for the greedy policy and the optimal robust Bellman operators.
arXiv Detail & Related papers (2022-05-28T04:05:20Z) - Safe Online Bid Optimization with Return-On-Investment and Budget
Constraints subject to Uncertainty [87.81197574939355]
We study the nature of both the optimization and learning problems.
We provide an algorithm, namely GCB, guaranteeing sublinear regret at the cost of a potentially linear number of constraints violations.
More interestingly, we provide an algorithm, namely GCB_safe(psi,phi), guaranteeing both sublinear pseudo-regret and safety w.h.p. at the cost of accepting tolerances psi and phi.
arXiv Detail & Related papers (2022-01-18T17:24:20Z) - Security and Privacy Enhanced Gait Authentication with Random
Representation Learning and Digital Lockers [3.3549957463189095]
Gait data captured by inertial sensors have demonstrated promising results on user authentication.
Most existing approaches stored the enrolled gait pattern insecurely for matching with the pattern, thus, posed critical security and privacy issues.
We present a gait cryptosystem that generates from gait data the random key for user authentication, meanwhile, secures the gait pattern.
arXiv Detail & Related papers (2021-08-05T06:34:42Z) - Safe Reinforcement Learning with Linear Function Approximation [48.75026009895308]
We introduce safety as an unknown linear cost function of states and actions, which must always fall below a certain threshold.
We then present algorithms, termed SLUCB-QVI and RSLUCB-QVI, for episodic Markov decision processes (MDPs) with linear function approximation.
We show that SLUCB-QVI and RSLUCB-QVI, while with emphno safety violation, achieve a $tildemathcalOleft(kappasqrtd3H3Tright)$ regret, nearly matching
arXiv Detail & Related papers (2021-06-11T08:46:57Z) - Provably Efficient Safe Exploration via Primal-Dual Policy Optimization [105.7510838453122]
We study the Safe Reinforcement Learning (SRL) problem using the Constrained Markov Decision Process (CMDP) formulation.
We present an provably efficient online policy optimization algorithm for CMDP with safe exploration in the function approximation setting.
arXiv Detail & Related papers (2020-03-01T17:47:03Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.